Security

Speech Authentication Based on Perceptual Fingerprint Hashing

Free registration required

Executive Summary

A perceptual fingerprint hashing method is proposed for audio authentication in this paper. First, the biologic fingerprint image is divided into overlapping rectangle blocks by randomly using a chaotic sequence, and then the gravity center of each block is calculated. Finally, the perceptual Hashing value is generated based on the gravity center of each block. To authenticate the speech identity source, the perceptual fingerprint hashing that represents speaker's identity information and speech signal must be connected closely. So the perceptual fingerprint hashing value is embedded into the speech signal as a watermark.

  • Format: PDF
  • Size: 253.65 KB